News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Why hackers are bombarding users with MFA requests
Why hackers are bombarding users with MFA requests

MFA Prompt Bombing is an effective attack method used by attackers to gain access to a system protected by Multi-Factor Authentication (MFA). The attacker sends a large number of MFA approval requests to a user in order to overwhelm them with the requests. One wrong click and an attacker has access. Regardless of the level of MFA Prompt Bombing harassment, the goal is for the user to accept the MFA request and grant access to accounts or provide a way to run malicious code on a targeted system. The security industry views MFA prompt bombing attacks as a…

Read more

Combat identity-based attacks with Zero Trust
Combat identity-based attacks with Zero Trust

Identity-based threats have become a major source of attacks and data breaches. As a result, organizations today require improved identity awareness and new threat mitigation strategies, which is best achieved by implementing an identity-based Zero Trust approach. Below are the basics of how the Zero Trust model works and best practices for implementing it effectively. The Zero Trust model is a security approach based on the idea that organizations shouldn't automatically trust everyone inside or outside the infrastructure perimeter. Instead, every entity or user trying to access the system must verify themselves. What is…

Read more

Defend against identity-based attacks in real time
Defend against identity-based attacks in real time

Identity-based attacks that abuse compromised credentials to access resources are a blind spot in enterprise security defenses. For example, while there are real-time protection solutions against various types of attacks such as malware, malicious data access and its exfiltration, there is no protection against a scenario in which attackers authenticate themselves with valid but compromised credentials. A paradigm shift is therefore required to counter these attacks effectively. User identities must be treated as distinct attack vectors with specific characteristics and properties. This article examines why existing security portfolios fail against identity-based attacks and what measures companies are taking...

Read more

User Accounts: Hidden Danger From Shadow Admins

Shadow admin accounts are overprivileged user accounts that were inadvertently assigned. If a hacker compromises a shadow admin account, this poses a high risk to company security. Silverfort lists best practices against accounts with too high privileges. If an attacker can hijack privileged accounts and access their target systems, this massively endangers an entire network. However, identifying shadow admins and restricting their privileges is not an easy task. The following explains how shadow administrators emerge and what measures companies can take to effectively contain this hidden danger. This is how shadow administrator accounts are created...

Read more

New zero-trust approach at the identity level

Zero Trust has now become one of the most important security models. The concept is simple and intuitive: implicit trust is a vulnerability in itself, which attackers can exploit for lateral movement and access to sensitive data. The Zero Trust approach attempts to mitigate this risk by eliminating implicit trust from the corporate environment. Zero Trust always assumes that a security breach has already occurred. For example, an attacker managed to bypass some of the defenses in place and gain a foothold in the enterprise environment. In the next attack phase, the hacker moves...

Read more

Ransomware Spread: The Blind Spot in Security

New identity protection approach prevents critical security gaps caused by ransomware. However, almost no company is able to proactively prevent the automated spread of the ransomware payload if it has bypassed the defenses at delivery and execution. A comment from Martin Kulendik, Regional Sales Director DACH at Silverfort. Cyber ​​blackmail by ransomware remains one of the greatest security threats facing businesses. The common practice in cybersecurity today is to protect yourself against the delivery and execution phases of these attacks. However, almost no company is able to proactively prevent the automated spread of the ransomware payload if ...

Read more

Multi-factor authentication: multiple protection against hackers
Multi-factor authentication: multiple protection against hackers

The high number of attacks in which compromised login data are misused shows that passwords alone are no longer sufficient as a trustworthy identification of legitimate users, but that the use of multi-factor authentication (MFA) has become a fundamental building block for corporate security. MFA requires users to provide convincing proof of their identity in addition to their login credentials. According to Microsoft, MFA can prevent identity-based attacks based on stolen credentials up to 99,9 percent. Even if a user's credentials are compromised, MFA attackers make it extremely difficult to circumvent the authentication requirements. How does multi-factor authentication work? MFA complements the authentication process ...

Read more

When dangerous home office devices return to the office

As the COVID-19 vaccination campaign continues, organizations should be concerned about how a possible mass return of remote workers to their offices could impact corporate network security. At first glance, it seems like the end of remote work will strengthen the security posture of most companies. Eventually, employees return to the safety and comfort of the corporate network. Tucked away in the safe haven “office” But is working inside the perimeter really safer? Unfortunately, hackers continue to find ways to breach perimeter security controls.

Read more

Uniform risk analysis of authentication attempts
Access access authentication

Silverfort and Ping Identity jointly rely on a uniform risk analysis of authentication attempts. Product integration provides comprehensive visibility and assessment of access activities, enabling customers to identify and respond to threats. Silverfort, a Unified Identity Protection company, recently started working with Ping Identity. Together they want to support customers with a standardized risk analysis of authentication and access attempts - both in local and in multi-cloud environments. This is to identify and prevent identity-based attacks. 61 percent of attacks are based on stolen credentials According to the Verizon 2021 Data Breach Investigations Report ...

Read more

Identity and access management for Azure Active Directory
B2B Cyber ​​Security ShortNews

Silverfort Unified Identity Protection Platform for Microsoft Azure Active Directory. The platform now enables organizations to centralize identity and access management (IAM) for cloud and legacy on-premises resources on Azure Active Directory, including those that could not previously be migrated. Silverfort, a Unified Identity Protection company and member of the Microsoft Intelligent Security Association (MISA), now enables companies to consolidate identity and access management for all devices, applications and environments on Microsoft Azure Active Directory (Azure AD). Unified Identity Protection Platform for Azure With the Silverfort Unified Identity Protection Platform ...

Read more